diff --git a/landing/keyservers.react.js b/landing/keyservers.react.js index 644cf5c26..1dc5ff302 100644 --- a/landing/keyservers.react.js +++ b/landing/keyservers.react.js @@ -1,141 +1,149 @@ // @flow import { create } from '@lottiefiles/lottie-interactivity'; import * as React from 'react'; import { useIsomorphicLayoutEffect } from 'lib/hooks/isomorphic-layout-effect.react.js'; import { assetsCacheURLPrefix } from './asset-meta-data.js'; +import KeyserverFAQ from './keyserver-faq.react.js'; import css from './keyservers.css'; import ReadDocsButton from './read-docs-btn.react.js'; +import RequestAccess from './request-access.react.js'; function Keyservers(): React.Node { React.useEffect(() => { import('@lottiefiles/lottie-player'); }, []); const onEyeIllustrationLoad = React.useCallback(() => { create({ mode: 'scroll', player: '#eye-illustration', actions: [ { visibility: [0, 1], type: 'seek', frames: [0, 720], }, ], }); }, []); const onCloudIllustrationLoad = React.useCallback(() => { create({ mode: 'scroll', player: '#cloud-illustration', actions: [ { visibility: [0, 0.2], type: 'stop', frames: [0], }, { visibility: [0.2, 1], type: 'seek', frames: [0, 300], }, ], }); }, []); const [eyeNode, setEyeNode] = React.useState(null); useIsomorphicLayoutEffect(() => { if (!eyeNode) { return undefined; } eyeNode.addEventListener('load', onEyeIllustrationLoad); return () => eyeNode.removeEventListener('load', onEyeIllustrationLoad); }, [eyeNode, onEyeIllustrationLoad]); const [cloudNode, setCloudNode] = React.useState(null); useIsomorphicLayoutEffect(() => { if (!cloudNode) { return undefined; } cloudNode.addEventListener('load', onCloudIllustrationLoad); return () => cloudNode.removeEventListener('load', onCloudIllustrationLoad); }, [cloudNode, onCloudIllustrationLoad]); return ( -
-
- -
-
-

- Reclaim your - digital identity. -

-

- The Internet is broken today. Private user data is owned by - mega-corporations and farmed for their benefit. -

-

- E2E encryption has the potential to change this equation. But - it’s constrained by a crucial limitation. -

-
+
+
+
+ +
+
+

+ Reclaim your + digital identity. +

+

+ The Internet is broken today. Private user data is owned by + mega-corporations and farmed for their benefit. +

+

+ E2E encryption has the potential to change this equation. But + it’s constrained by a crucial limitation. +

+
-
- -
-
-

Apps need servers.

-

- Sophisticated applications rely on servers to do things that your - devices simply can’t. -

-

- That’s why E2E encryption only works for simple chat apps today. - There’s no way to build a robust server layer that has access to - your data without leaking that data to corporations. -

-
+
+ +
+
+

Apps need servers.

+

+ Sophisticated applications rely on servers to do things that your + devices simply can’t. +

+

+ That’s why E2E encryption only works for simple chat apps + today. There’s no way to build a robust server layer that has + access to your data without leaking that data to corporations. +

+
-
-

- Comm - - {' '} - is the keyserver company. - -

-
+
+

+ Comm + + {' '} + is the keyserver + company. + +

+
-
-

In the future, people have their own servers.

-

- Your keyserver is the home of your digital identity. It owns your - private keys and your personal data. It’s your password manager, - your crypto bank, your digital surrogate, and your second brain. -

-
-
- +
+

In the future, people have their own servers.

+

+ Your keyserver is the home of your digital identity. It owns your + private keys and your personal data. It’s your password + manager, your crypto bank, your digital surrogate, and your second + brain. +

+
+
+ +
+ +
); } export default Keyservers;